Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient and Strategyproof Spectrum Allocations in Multichannel Wireless Networks., , , and . IEEE Trans. Computers, 60 (4): 580-593 (2011)Supporting K nearest neighbors query on high-dimensional data in P2P systems., , , and . Frontiers of Computer Science in China, 2 (3): 234-247 (2008)An Adaptive and Selective Instruction Active Push Mechanism for Multi-core Architecture., , and . NAS, page 359-366. IEEE Computer Society, (2010)A Conflict Resolution Method in Context-Aware Computing., , , and . ACIS-ICIS, page 135-140. IEEE Computer Society, (2007)Secure Multimedia Streaming with Trusted Digital Rights Management., , and . LCN, page 817-821. IEEE Computer Society, (2005)Twins: Device-free object tracking using passive tags., , , , , , , and . INFOCOM, page 469-476. IEEE, (2014)Broadcast capacity for wireless ad hoc networks., , , , , and . MASS, page 114-123. IEEE Computer Society, (2008)Efficient Data Aggregation in Multi-hop Wireless Sensor Networks under Physical Interference Model., , , , , , and . MASS, page 353-362. IEEE Computer Society, (2009)CCD: Locating Event in Wireless Sensor Network without Locations., , and . MASS, page 672-677. IEEE Computer Society, (2011)Nowhere to hide: An empirical study on hidden UHF RFID tags., , , , , , and . ICPADS, page 608-615. IEEE Computer Society, (2014)